Sei sulla pagina 1di 7

Understanding

the cybersecurity
threat

People, process, controls, Top 10 Summit takeaways


culture and, yes, technology 1. Never stop being vigilant; the cybersecurity threat is dynamic
and ongoing.
On June 11–12, 2018, more than 30 board members and
2. The board’s role is not cybersecurity risk management; it is
panelists met in Dallas for the EY Cybersecurity Board cybersecurity risk oversight.
Summit. The event featured deep-dive discussions on
3. Boards may need to restructure their committees and develop new
cybersecurity risk and oversight. charters to adequately oversee cybersecurity risk management.
4. Directors want and need more education on cybersecurity risk.
The board members who participated sit on about 50
boards, representing a cross-section of industries, 5. Boards need to engage a third party to independently and objectively
assess whether the company’s cybersecurity risk management
geographies and sizes, including many Fortune
program and controls are meeting its objectives.
500 companies. The goal was to learn more about
6. These third parties should have direct dialogue with the board to
cybersecurity threats, the systems and controls that could
report on the effectiveness of the company’s cybersecurity risk
detect and mitigate such threats, and the oversight role management program.
the board should play from a governance perspective.
7. Boards and companies need to adequately plan for a cybersecurity
crisis, including having an arrangement with all their third-party
Discussions included an overview of the cybersecurity
specialists in place before a crisis hits.
landscape, lessons learned from recent breaches, the cyber
8. The board and management need to routinely practice the
risk executive’s perspective, regulatory expectations and cybersecurity response plan.
leading practices for board oversight. Summit attendees also
9. Management should consider providing the board regular updates
visited the EY Cybersecurity Center in Dallas, one of six that with key metrics on critical cybersecurity controls communicated in
the firm operates globally on an around-the-clock basis. Here plain English.
we offer 10 key takeaways and a summary of the various 10. While improved detection efforts may increase the rate of cyber-
sessions of the program. related incidents, the rate of noteworthy incidents should decline as
organizations improve how they manage and contain these incidents.

For more articles like this, please visit ey.com/boardmatters. June 2018 | 1
Understanding the cybersecurity threat

“Are we doing well, or have An overview of the cyber landscape


we just been lucky?” At a dinner discussion on the opening night of the Summit, Jonathan
Trull, Global Director of Microsoft’s Enterprise Cybersecurity Group,
Almost all of the Summit attendees serve on their audit
took the attendees on a verbal tour of the cyber landscape. He
committees, and most serve as chair. Most agreed that they have
explained how the explosion of new technologies is transforming
primary board responsibility for cybersecurity. Yet some feel
business but is also causing the risk to rise sharply.
unsure about what they should be doing — and how well they are
doing it. Because of all the unfamiliar terminology related to the No matter what level of sophistication you bring to this landscape,
sophisticated technology involved, cybersecurity feels functionally you have to remain humble, according to Mr. Trull, fearing what you
different from other oversight responsibilities, they said, and they don’t know and recognizing that you will never know everything.
are searching for more knowledge to inform better judgment. He describes his own concern this way: “What did we miss?”

As one director put it, “Are we doing well, or have we just been That said, you need strong controls and, ideally, uniform hardware
lucky?” Another asked, “Have we done enough?” A third put it and processes — to detect attacks, remediate them and be
this way: “How do I get my hands around the issue to know it resilient in recovering from the damage. As a best practice, he
better? I want to ask the right questions [of management] and be cited the SANS Institute’s Top 20 CIS Critical Security Controls for
able to interpret their answers to better protect the company.” Effective Cyber Defense (SANS 20).

So a central theme of the Summit was learning how to leverage In trying to ward off attacks, worry about flaws and shortcomings
the directors’ broad business and risk management experience in the technology, but worry even more about the people who
to better support their oversight role, including ways to obtain have authorized access to the fortress you are trying to build.
necessary information despite possible gaps in cyber-related “They are often the weak link,” Mr. Trull said. Either inadvertently
technical knowledge. or intentionally, some of your employees, or those at third parties
you deal with or at supply chain partners, will open the door to bad
A related theme was recognizing the importance of
actors. Board members should be asking if their companies have
independence and objectivity in assessing a company’s
the right controls and processes to limit access to the right people,
cybersecurity risk management program and controls and
for the right purposes. Additionally, they should consider whether
increasing the board’s trust through third-party validation. The
the corporate culture is permissive or strict when it comes
people in charge of those controls shouldn’t be the ones doing
to security concerns. Making sure that the right controls and
the assessment or hiring others to do so, because self-protection
processes are in place up and down the supply chain is also critical.
could likely get in their way while investigating a breach.
There are many ways to keep the door closed, Mr. Trull noted. Give
The conversation touched on a broad range of topics, including
employees in sensitive positions a privileged access workstation,
the parameters for cybersecurity disclosure; whether the audit
which connects to the company network, but not the internet. Use
committee, or a more specialized subcommittee, is the proper
deception techniques to ensnare attackers, periodically recheck
venue for board oversight of cybersecurity risk; and the metrics
employees’ backgrounds and deploy “red teams” to aggressively
to use to determine success or failure.
hunt for system weaknesses.
“I don’t see a trend,” one board member said. “I don’t have any
But remember to stay humble and be wary. As you close some
sense of what good or bad looks like.”
doors, new ones open, courtesy of new technologies, and these
may be harder to close. Thanks to the Internet of Things, for
example, interconnected smart devices (everything from sensitive
gauges on oil-drilling rigs to kitchen toasters) are proliferating
A related theme was recognizing by the millions. Many makers of these devices are low-tech
companies — as they jump into high tech, their risk levels are
the importance of independence jumping as well, potentially raising your risk level too.
and objectivity in assessing a
The takeaway is to never stop being vigilant — the cyber threat
company’s cybersecurity risk is dynamic and continuous. The bad guys never really go away.
management program and controls Instead, they keep retooling to stay one step ahead of you, and
they only have to be right once. You may think you are the safest
and increasing the board’s trust company in the world this morning, only to find out that the world
through third-party validation. has changed this afternoon.

For more articles like this, please visit ey.com/boardmatters. June 2018 | 2
Understanding the cybersecurity threat

Lessons learned from cyber breaches We’re heading into a “zero-trust


On day two of the Summit, one panelist echoed a note from the environment,” one in which every
dinner session. “The number one thing to worry about is your
personnel,” he said. “But in doing postmortems of significant
system and everyone’s identity
breaches, it becomes clear that bad decisions by management are will be continually checked.
another big concern.”

Plans are drafted but not put into place, so when a breach
comes, the reaction is largely improvised. “And that’s really bad,”
according to the panelist. “People need to know what to do, and
the first week is critical — you don’t want to spend that week
getting people up to speed.” Another added, “You need a checklist
in place before the crisis hits, and you need to routinely practice
the response plan.” In fact, you have to do a lot of things now to “It’s a big mistake,” said one panelist, “to have the people who
try to prevent a crisis and to be ready if one occurs. oversaw the program be the ones to investigate why there was a
significant breach.”
Your company should pick a cybersecurity framework (the most
cited is the one offered by the National Institute of Standards In a more general way, you have to recognize that people
and Technology) and follow up with a maturity and effectiveness in charge of the program can allow self-interest, whether
assessment, which drives a road map and investment. intentionally or not, to affect their communications to the board.
Organizations should think beyond the framework, which is just a That can affect when or if disclosures are made, opening up
tool, and implement additional controls, like the SANS 20. They additional regulatory and legal risks. “Too often, the IT team
should also keep a strong focus on the people factor, including tries to fight the kitchen fire for too long before calling for help,”
performing background checks, removing credentials following noted another panelist.
terminations, unplugging acquired technology that is no longer
necessary, and the like. In terms of a response plan, there are a number of ways to
prepare. The chairs of the board and the audit committee
We’re heading into a “zero-trust environment,” the Summit can do a “war game” to assess escalation methodologies.
attendees were told, one in which every system and everyone’s The full board can do its own tabletop exercise to figure out a
identity will be continually checked. For example, is the person communications strategy.
who is using this password working at an odd time, based on past
patterns? Accessing unusual files? Some companies are already The key is engagement. But boards are often reluctant to engage
doing this, and there will be a greater uptick in three to five years. in this area even though it is now a core pillar of their role. As a
director, it’s not necessary to be a techie in order to be effective,
To check on the efficacy of your program, it’s critically important but you can’t be intimidated by the topic either. Instead, you
to bring in a third party for an independent assessment. The have to learn enough to ask smart questions and make sure that
company needs to know which of its crown jewels must be management’s answers are complete and clear, giving you the
protected at all costs. Often there isn’t agreement within the information you need to effectively oversee cybersecurity risk.
company about this or if the focus is on insurance rather than
protection. The assessment should also bake in legal risks: How are
you protecting data that is governed by regulations or belongs to The cyber risk executive’s perspective
outside parties? Too often, the assessment is done on breach day.
How can boards best support their cyber executives? The
Likewise, don’t wait for the crisis to hit to start looking for outside three panelists who spoke during this session underscored the
help. Find essential experts (e.g., legal, public relations, business importance of board members becoming savvy enough to ask the
continuity) ahead of time and sign them up now. Board members right questions — not the “ticky-tacky techie kind,” as one called
in attendance were reminded that “you will need their cell them, but those that are strategic in nature.
numbers if a crisis hits on a weekend.”
Many cyber executives are highly technical and intensely focused
If a big breach does occur, you will also need an independent on protecting their company’s data. They have to be good at
team, including a technologist, to ferret out the cause. The team determining why something is at risk and then fashioning a fix.
should not report to the chief information security officer (CISO). Because they have one foot in the tech team and the other in the

For more articles like this, please visit ey.com/boardmatters. June 2018 | 3
Understanding the cybersecurity threat

executive team, CISOs also have to keep the business in mind by Given the growing sophistication of cyber attacks, the proliferation
balancing the dangers of new technologies against the business of access points and improved detection efforts, directors should
need to quickly adopt them. Put another way, they need to help expect the overall rate of cyber incidents to increase. Conversely,
the company find the right mix of risk avoidance and business the rate of noteworthy incidents should decrease as organizations
enablement. So the CISO also has to be good at negotiating and improve their ability to effectively manage and contain these
brokering solutions with lots of stakeholders when the business cyber incidents.
is affected. The goal is to explain the risks well enough to the
business leaders so that they take more ownership of the controls
to protect the company. Regulatory expectations
Those risks are constantly changing. Companies and their CISOs In February 2018, the U.S. Securities and Exchange Commission
have to step back and assess all of the different catalysts — (SEC) released its interpretive guidance on cybersecurity
macroeconomic, geopolitical, the pace of technological change, disclosures, which provides a statement of the SEC’s expectations.
higher consumer expectations and more — and then “raise their
game” to update their defenses. IBM’s 10 essential security When there is a breach, companies must take time to understand
practices were described as a flexible framework to address the full depth and scope of the breach to avoid disclosing dribs and
security risk at any size company. drabs of information, which can lead to additional problems. How
long this will take is sometimes left to good business judgment,
In terms of the corporate audit function, it’s good to have all of but companies cannot sit on information forever, especially given
the controls in place, but life isn’t perfect. “The last thing you some states’ time limits for disclosure. The prudent thing to do, if
want is to have to ask yourself, ‘why didn’t I catch it?’ So you you are contemplating taking action but are not yet sure what the
need to assess where the risks are and assign a team to produce evolving facts will show, is to contact the SEC, as a “placeholder,”
a risk mitigation plan, tied to a determination of the company’s so that the agency knows that something is going on. Companies
risk appetite,” said one panelist. Companies have to keep up with can contact a regional office or the headquarters in Washington,
new threats; communicate with customers, managers and third depending on the relationships, and then the SEC can attempt to
parties; and figure out protections and workarounds. work with the company.

They also have to watch out for turf wars among their cyber There is a difference between disclosing more and disclosing
executives. The CISO, the chief information officer (CIO) and better. The main focus should be on protecting against cyber
the chief privacy officer all need clearly defined roles and attacks and mitigating losses and on educating stakeholders
responsibilities. about the company’s cybersecurity risks, controls and processes.

A good CISO puts together a wish list for the board but also a Bob Sydow, EY Americas Cybersecurity Leader, recently testified
menu of what is practical. For example, the CISO might say, “For before the Senate Committee on Banking, Housing and Urban
these threats, this is the amount of money we need — and this is Affairs about cyber risks facing the financial services industry. He
what it will cost us if we don’t do what I suggest.” Transparency briefed the board members on several cyber-related changes that
with the board is also key. It’s good for the board to hear that Congress is considering, cautioning that any number of things could
the CISO is not 100% sure. Still, it is really hard to tally a win, and shift in the event of additional major breaches. The possible changes
really easy to say there was a breach. to consider include:

When presented with so much information, the board may wonder • Requiring boards to add a cyber expert: Should it be
what it all means or how to know if it is good or bad. A dashboard approved, this could be a difficult mandate to fulfill, given the
that can be monitored in real time can be valuable, just like when shortage of qualified talent. Directors should have more of a
“the red light goes on in a car before the engine seizes up,” role in this area, rather than ceding authority to an expert.
explained one panelist.
• Mandatory attestation for cybersecurity: The American
Institute of Certified Public Accountants (AICPA) issued a
cybersecurity risk management evaluation and reporting
framework in 2017 that includes an attestation component.
There is a difference But the framework is voluntary and intended to be
between disclosing more market driven.

and disclosing better.

For more articles like this, please visit ey.com/boardmatters. June 2018 | 4
Understanding the cybersecurity threat

• More consumer protections: There is a trade-off between EY’s center tracks threats across industries, sectors and
privacy protections and information sharing that could limit geographies, revealing the latest twists in attack profiles and
innovation. For example, would the tough new internet privacy threat exposures. It can extrapolate clues and lessons learned
law in the European Union, the General Data Protection from an attack on one company to a potentially similar situation
Regulation (GDPR), be a good thing for the US? facing others, all without compromising the confidentiality of any
company’s operations or data. And the center obviates the need
Separately, a number of states have enacted their own for clients to maintain their own infrastructure.
cybersecurity laws, creating multiple sets of regulations. How
onerous is that? And would it be better to push for a single federal In addition to detecting and responding to threats, the center
standard to pre-empt a complex and possibly conflicting set of applies necessary patches and erects and maintains barriers
state initiatives? around legacy systems, among other defensive measures.

Mr. Sydow mentioned the need for more protections against On their tour, board members were able to peek into a threat
litigation that impedes the sharing of information related to detection and response room, filled with concentric rings of
cybersecurity threats and attacks. Litigation’s inhibiting effect cyber analysts. If anomalies are detected, an analyst may call in
could be hurting companies that might have escaped or limited a supervisor. The analyst and the supervisor can go to a separate
their damage if helpful guidance had reached them before they “war room” to discuss next steps, via videoconference, with the
were attacked. But he added that some groundwork for sharing affected company’s personnel.
has already been laid by the FBI, which gathers and shares
information about encryption keys related to ransomware. If a threat is determined to be serious enough, the analyst will
employ tools to immediately shut down the company’s affected
In the case of a cyber incident, organizations should have a policy systems and contain the damage. Specifically, the analyst can
related to trading. For example, there was a discussion about move to isolate client “hosts” — PCs, servers, apps — that appear
trading that might occur around the time of a breach. Even if such to be infected.
trading is innocent in nature, it could still lead to reputational
damage. Therefore, disclosure controls and procedures should
provide an “early warning system” to enable companies to Leading practices for board oversight
determine whether they need to file a current report on Form
8-K, make disclosure in any other SEC filing, issue a press release In this final session of the Summit, those gathered were asked the
or suspend trading in their stock. Boards should make sure that inevitable question: How can you organize all of this information
companies have clear restrictions in place and that these policies on cybersecurity risk oversight?
are widely communicated. This may require companies to assess
One suggestion was to use the five principles found in the National
whether their codes of ethics and insider trading policies take
Association of Corporate Directors’ (NACD) Cyber-Risk Oversight:
into account measures to prevent trading on the basis of material
Director’s Handbook Series:
nonpublic information regarding cybersecurity risks and incidents.

1. Directors need to understand and approach cybersecurity


as an enterprise-wide risk management issue, not just an
Cybersecurity Center tour IT issue.
Board members then toured EY’s Cybersecurity Center in Dallas, 2. Directors should understand the legal implications of cyber
one of six globally that it operates 24 hours a day, 7 days a week, risks as they relate to their company’s specific circumstances.
monitoring threats to clients and reacting in real time to prevent
attacks or contain damage. EY has more than 7,000 security 3. Boards should have adequate access to cybersecurity
professionals globally. expertise, and discussions about cyber-risk management
should be given regular and adequate time on board meeting
Many companies are either not equipped to fully protect their agendas.
assets or choose to retain a third party to support their internal
activities in these areas. For one thing, there is a talent shortage, 4. Directors should set the expectation that management
with estimates of a global shortfall of about 1.8 million security will establish an enterprise-wide cyber-risk management
professionals within five years. In addition, centers like EY’s have framework with adequate staffing and budget.
a significantly broader scope and reach than some companies can
5. Board-management discussions about cyber risk should
achieve on their own.
include identification of which risks to avoid, which to accept,
and which to mitigate or transfer through insurance, as well
as specific plans associated with each approach.

For more articles like this, please visit ey.com/boardmatters. June 2018 | 5
Understanding the cybersecurity threat

Additionally, five questions can be asked: Many said they are eager to follow up on a number of fronts: to
learn more about the SANS 20 security controls, about third-
1. Where does governance reside? party assessments, about metrics and industry benchmarking.
2. What should management be asked to do?
They said they have new questions to raise with their boards
3. What are the company’s critical assets? about committee oversight of cybersecurity risk. Should that role
reside with the audit committee, a more specialized subcommittee
4. What cyber threats are the company or others in their or even an ad hoc group like the one described?
industry facing?
As to whether boards should add someone with cybersecurity
5. Is there an appropriate level of cyber insurance, and what
knowledge, they would want that person to also be knowledgeable
does it actually cover?
about broader business issues and have deep management
One Summit panelist described being part of an ad hoc special experience. But they acknowledged how difficult it is to find
committee that a medium-sized company used for a deep dive on qualified candidates, with some suggesting searches among the
cybersecurity risk management to find answers to these and other senior military ranks and the use of recruiters.
questions. The catalyst for creating the ad hoc committee was
Most of all, they agreed on the need to press management
an outbreak of big breaches within the company’s industry and
for more complete and clear answers about their companies’
a sense that the board was not sufficiently prepared to support
management in responding to attacks that might come its way. cybersecurity risk management programs, even if that meant
asking more questions and adding time to an already full agenda.
The ad hoc committee was made up of two audit committee And they agreed on the need for independent and objective
members, the Chief Financial OffIcer and the CIO. The committee verification of what they are being told.
created a charter outlining its responsibilities. One of the committee
members wanted more background information on cybersecurity
risk management, so they attended the 20-hour NACD Cyber-Risk
Oversight Course. The ad hoc committee, which reported directly
EY Cybersecurity Board Summit panelists
to the board, looked at the company’s assets and determined • Amy Brachio, EY Global and Americas Risk Advisory Leader
which were critically important and then put a monetary value on
• Larry Clinton, President and CEO, Internet Security Alliance
each in terms of mitigating the cyber risk, accepting it, avoiding
it or transferring a portion of it. That exercise determined the • Mark Ferguson, Board Member, VSE Corp., and a former
level of investment — for insurance, red teams and other tools and admiral who commanded US Naval Forces in Europe and Africa
processes. The ad hoc committee was dissolved once its charter • Kris Lovejoy, Founder and CEO of BluVector Inc. and a
was completed. Cybersecurity risk management is now discussed in former CISO at IBM
depth every six months by the audit committee and every year by • Tim Ryan, US Cyber Investigations Leader, Ernst & Young LLP
the full board.
• Shamoil Shipchandler, Director, Fort Worth Regional Office,
In assessing all that they had heard at the Summit, the board Securities and Exchange Commission
members discussed why boards are generally uncomfortable • Bob Sydow, EY Americas Cybersecurity Leader
dealing with cybersecurity risk. One noted the daunting pace
• Wayne Terry, VP Corporate Audit Services and ERM
at which change is occurring, in both new technologies and
Committee Chairman, Flowserve
new threats. Another pointed to the different environment that
the digital revolution has fostered. And a third said that there • Ben Trowbridge, EY Americas Cyber Risk Co-Sourcing and
just wasn’t a lot of codified practice to follow, at least before Managed Services Leader
the appearance of the NACD Cyber-Risk Oversight Handbook. • Jonathan Trull, Global Director of Microsoft’s Enterprise
Management might not be that comfortable dealing with cyber Cybersecurity Group
risks either, another board member added. • Don Vieira, Senior Cybersecurity Attorney, Skadden, Arps,
Slate, Meagher & Flom
So what are the takeaways from the Summit, and how will the
attendees build on what they learned? As a group, they sounded • Jamie Millar, Founder and President of SkyBridge Associates,
both more aware of the challenges posed by cyber and more Moderator
empowered to perform their oversight role. • Stephen Klemash, EY Americas Leader, Center for Board Matters

• Chuck Seets, EY Americas Assurance Markets Leader

For more articles like this, please visit ey.com/boardmatters. June 2018 | 6
Understanding the cybersecurity threat

EY | Assurance | Tax | Transactions | Advisory


Questions for the board to consider About EY
EY is a global leader in assurance, tax, transaction and advisory services.
• From a governance perspective, who owns The insights and quality services we deliver help build trust and confidence in
cybersecurity risk for the company? the capital markets and in economies the world over. We develop outstanding
leaders who team to deliver on our promises to all of our stakeholders. In so
• Does the board understand the company’s total doing, we play a critical role in building a better working world for our people,
risk exposure from a cyber attack perspective (e.g., for our clients and for our communities.

financial, third parties, legal, reputation)? EY refers to the global organization, and may refer to one or more, of the
member firms of Ernst & Young Global Limited, each of which is a separate
• How does the board evaluate the company’s culture legal entity. Ernst & Young Global Limited, a UK company limited by
guarantee, does not provide services to clients. For more information about
with respect to cybersecurity? For example, are
our organization, please visit ey.com.
employees routinely trained? Are performance
Ernst & Young LLP is a client-serving member firm of Ernst & Young Global
bonuses at stake? What security awareness
Limited operating in the US.
messaging is routinely conveyed to employees?
About the EY Center for Board Matters
• H
as the board leveraged third-party expertise, Effective corporate governance is an important element in building a
better working world. The EY Center for Board Matters supports boards,
as described in the NACD’s Cyber-Risk Oversight committees and directors in their oversight role by providing content,
Handbook, to validate the cybersecurity risk insights and education to help them address complex boardroom issues.
management program is meeting its objectives? Using our professional competencies, relationships and proprietary
corporate governance database, we are able to identify trends and emerging
• What information has management provided to help governance issues. This allows us to deliver timely and balanced insights,
data-rich content, and practical tools and analysis for directors, institutional
the board assess which critical business assets and investors and other governance stakeholders.
critical partners, including third parties, are most
© 2018 Ernst & Young LLP.
vulnerable to cyber attacks? All Rights Reserved.

• Has the organization considered benchmarking its SCORE no. 03865-181US


CSG no. 1806-2791460
cybersecurity efforts against comparable companies?
ED None
• Have appropriate and meaningful cyber metrics
This material has been prepared for general informational purposes only
been identified and provided to the board on a
and is not intended to be relied upon as accounting, tax or other professional
regular basis? advice. Please refer to your advisors for specific advice.

• How does management evaluate and categorize ey.com/boardmatters


identified incidents and determine which to elevate
to the board?

For more articles like this, please visit ey.com/boardmatters. June 2018 | 7

Potrebbero piacerti anche